Select to expand quote
Macroscien said..
Main purpose of such application ( recording video remotely) is deterrence.
Deterrence requires presence. How does an assailant know you have this app?
Most people carry their phone in their bag/pocket. By the time they are being attacked they will not have the opportunity to retrieve it, let alone activate it
So the only alternate is to hold the phone in the hand, But then it is in clear view. What is to stop an assailant grabbing the phone at the beginning of the attack? The only way to prevent this is to be filming any person who comes near you, flooding the server.
Select to expand quote
You could present offender fact that everything from now is recorded on this security camera.
In such case offender have that best option to do nothing and walk away free.
Or figure since they are now in for one, they might as well go in for all... The worst thing you can do in a robbery is piss off your robber...
And that is ignoring the practicality of the situation.
It will be several seconds for your phone to establish a handshake data stream to a server, during which your filming will not go un-noticed
How do you propose regulating this data stream? What is to stop any person with a PC from spamming the server? keeping in mind Authentication will take even more time.
How will the emergency services receive this GPS data? what stops any person with an IP capable machine spamming GPS data?
How will emergency services receive the video stream for this "Added value"? How will the information be authenticated? Since the video stream is a passive view, how will this help them prepare more than having someone on the phone they can directly ask questions of value?